Cybersecurity Roles, Processes & Operating System Security

  • 4.6
Approx. 15 hours to complete

Course Summary

This course provides an overview of cybersecurity roles, processes, and operating system security. Students will learn about various security threats and vulnerabilities, as well as techniques for protecting systems and networks.

Key Learning Points

  • Learn about the roles and responsibilities of cybersecurity professionals
  • Understand the processes and procedures involved in securing systems and networks
  • Explore the various threats and vulnerabilities that can compromise security

Related Topics for further study


Learning Outcomes

  • Understand the importance of cybersecurity in protecting systems and networks
  • Identify potential security threats and vulnerabilities
  • Learn techniques for securing operating systems and networks

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer systems and networks
  • Familiarity with common cybersecurity terminology

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video lectures
  • Quizzes and assignments

Similar Courses

  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Cybersecurity Fundamentals

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Eva Galperin

Related Books

Description

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:

Outline

  • People Process & Technology
  • Welcome to People, Process and Operating System Fundamentals for Cybersecurity
  • Overview of People, Process and Technologies
  • What is IT Security?
  • Frameworks and their purpose
  • Roles in Security
  • Introduction to Process
  • Business Process Management Overview
  • Information Technology Infrastructure Library (ITIL) Overview
  • Key ITIL Processes
  • Earn an IBM digital badge
  • Your Subject Matter Experts
  • ITIL framework
  • What is IT Service Management?
  • Welcome to People, Process and Operating System Fundamentals for Cybersecurity
  • Frameworks, Policies and Roles
  • Business Process Management and IT Infrastructure Library Basics
  • People, Process and Technology
  • Examples & Principles of the CIA Triad
  • Introduction to the CIA Triad module
  • Who are Alice, Bob and Trudy?
  • Confidentiality, Integrity and Availability
  • Authenticity and Accountability
  • Priscilla Mariel Guzman Angulo - What's important for my job.
  • Threat Horizon 2019: Disruption. Distortion. Deterioration
  • Further discussion of confidentiality, integrity and availability
  • Principles of the CIA Triad
  • Authentication and Access Control
  • Introduction to Authentication and Access Control
  • Identification and AAA
  • Access Control Methods
  • Access Control - Physical and Logical
  • Open Web Application Security Project (OWASP)
  • OWASP Top 10 Project
  • What is AAA?
  • Access Control
  • Authentication and Access control
  • Windows Operating System Security Basics
  • Welcome to operating system fundamentals
  • User and Kernel Mode
  • File Systems
  • Directory Structure
  • Shortcuts and Commands
  • Additional Shortcuts
  • User and Kernel Modes
  • File Systems and Directory Structure
  • Shortcuts and Commands
  • Windows Operating System Security Basics
  • Linux Operating System Security Basics
  • Key Components
  • File Systems
  • Basic Commands
  • Permissions and Owners
  • Pentestmonkey research
  • Key Components
  • File systems
  • Linux Basic Commands
  • Linux Operating System security basics
  • macOS Security Basics
  • macOS Auditing
  • macOS Security Settings
  • macOS Recovery
  • macOS Developer resources
  • macOS Resources Knowledge Check
  • Overview of Virtualization
  • Virtualization module introduction
  • An Overview of Virtualization
  • Virtualization to Cloud
  • What is Cloud Computing?
  • Cloud Benefits, Security and Governance
  • Wrap up
  • SANS Institute research exercise
  • Differences between virtualization and cloud - RedHat
  • Virtualization Basics and Cloud Computing
  • Virtualization Basics

Summary of User Reviews

Discover the roles, processes and operating system security aspects of cybersecurity with this comprehensive course. Users have praised the course for its practical and hands-on approach to learning cybersecurity.

Key Aspect Users Liked About This Course

Practical and hands-on approach to learning cybersecurity

Pros from User Reviews

  • Comprehensive coverage of cybersecurity topics
  • Real-world examples and scenarios
  • Engaging and knowledgeable instructors
  • Interactive and challenging assignments
  • Great preparation for cybersecurity certification exams

Cons from User Reviews

  • Some technical concepts may be overwhelming for beginners
  • Limited opportunities for peer-to-peer interaction
  • No certificate of completion for free version of the course
  • Occasional technical issues with the Coursera platform
  • Some users found the course to be too long and time-consuming
English
Available now
Approx. 15 hours to complete
IBM Security Learning Services
IBM
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses